This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Communication

Question 2 Process and technology for setting up a secure communication session between the main office and a remote office using both symmetric and asymmetric methods.

Pssst… we can write an original essay just for you.

Any subject. Any type of essay. We’ll even meet a 3-hour deadline.

GET YOUR PRICE

writers online

Question 2 Process and technology for setting up a secure communication session between the main office and a remote office using both symmetric and asymmetric methods.

            Symmetric and asymmetric methods are methods that employ the use of symmetric and asymmetric keys for encryption and decryption. Symmetric keys are more classified though the keys are allocated with the users that require them, and they both share the key. Mass encryptions use symmetric keys, for they have the most history in file transfer and offer confidentiality to the users. An asymmetric key is the most used key, for it uses a separate key for decryption and encryption. Anyone can use the encryption key in asymmetric while the decryption key is private; hence only the receiver can decrypt the message. When the two methods are used together, symmetric and asymmetric methods, the communication session becomes secure.

When symmetric keys are used alone, they are weak, for, with time, one cannot tell where the original message came from. The reason for the weakness is due to the broad masses that the symmetric key accommodates; hence a key can be circulated a lot and end up not being trackable, and the private key has to be with a large number of people. The strength of the symmetric key is that it provides high speed. The asymmetric key has more advantages compared to weaknesses. Asymmetric keys grant one the ability to provide integrity, authentication and non-repudiation, unlike symmetric keys.

When used together, asymmetric and symmetric keys, they strengthen each other and provide a safe and fast communication process.  The two should offer a safe, secure communication session between the main office and remote office, for they will make communication quick, reliable and confidential since decryption requires a private key.

 

 

 

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask